Ibm Research Cryptography

The company's research, technical and business experts have broken barriers in transaction processing speeds, developed the most advanced cryptography to secure transactions, and are contributing millions of lines of open source code to advance blockchain for businesses. Microsoft Adds Post-Quantum Cryptography to an OpenVPN Fork. Ekert, Neil Gershenfeld, Simon J. There’s also a cryptographic research aspect which will remain within Hyperledger’s Labs rather than part of the main Ursa project. Our teaching and research activities stretc. What if you want to query a search engine, but don't want to tell the search engine what you are looking for? You might consider encrypting your query, but if you use an ordinary encryption scheme, the search engine will not be able to manipulate your ciphertexts to construct a meaningful response. , he worked as an intellectual property lawyer (1998-2000) and as a senior research engineer for DoCoMo USA Labs (2000-2005). Jessica Lyons Hardcastle May 14, 2018 Co-founder and CEO Ambuj Kumar previously worked at Cryptography Research. We have seen exciting developments in cryptography: public-key encryption, digital signatures, the Data Encryption Standard (DES), key safeguarding schemes, and key distribution protocols. "There is a big misnomer that people should avoid regarding IBM's announcement," said Brian Hopkins, vice president and principal analyst at market research firm Forrester Research. Read more. Cryptography Research - Homomorphic Encryption. Mechanics, and as such it attests to the value of basic science research. Shafi Goldwasser and Ronald L. A form of cryptography. Security standards are constantly being updated and improved as new research is published and new attacks are unveiled by the security community.



Research Assistent, University of Gothenburg, Sweden, about 10 hours ago. The topics focus on applied computer science issues, in general, and on issues related to work carried out at IBM Research. Also, researchers at IBM have. With this objective in mind, IBM Research started a conversation termed as '5 in 5' way back in 2012, giving their top 5 predictions every year at IBM Think 2018 on how technology would change the. Quantum developments pose a critical threat to modern cybersecurity technologies and are of grave concern to the confidentiality, integrity, and privacy of personal information, business interests, and national security. Prosecco is a research team at INRIA Paris that does formal and practical security research on cryptographic protocols, software security, web security, and hardware protection mechanisms. Market value has been estimated considering the application and regional segments, market share, and size, while the forecast for each product type and application segment has been provided for the global and local markets. Fortanix Scores Partnerships with IBM Cloud and Equinix, Encrypts Data in Use. There’s also a cryptographic research aspect which will remain within Hyperledger’s Labs rather than part of the main Ursa project. Bio: Hugo Krawczyk is an IBM Fellow and Distinguished Research Staff Member with the Cryptography Group at the IBM T. The MIT-IBM Watson AI Lab is focused on fundamental artificial intelligence (AI) research with the goal of propelling scientific breakthroughs that unlock the potential of AI. ) The IBM blockchain is permissioned, meaning you have to be invited by an existing member to use it. The MIT researchers admit that their eavesdropping method may not hold up to other systems, but that with a little more research, it could be perfected. Former researcher at Cryptography Research Group at IBM, creator of the first FHE scheme, recipient of the MacArthur "Genius" Award. Shor’s algorithm has been a powerful motivator for the design, construction, testing and research on developing new quantum-resistant cryptography (Kobie). The potential of the industry has been investigated along. Watson Research center. What (and How) Can Linked. Blockchain is an emerging platform for transaction services that will fundamentally change the way we do business in many industries.



I was a Research Scientist at the Computer Science Laboratory at SRI International between 2013 and 2015. Swift-KeyRotate middleware and client. Business Programs and Resources. Strengthening of advanced research paper. The “governors” of a blockchain issue cryptographic membership cards for participants. Quantum computers will be able to instantly break the encryption of sensitive data protected by today's strongest security, warns the head of IBM Research. Global Quantum Cryptography Market 2019 research report would be to deliver the correct and tactical analysis of the market share, growth factors, demand, industry size, regional segmentation, dynamics as well as prices variant for its forecast year 2026. Cryptography research has con-centrated on mathematically formalizing (a small number of) security assumptions, such as "computing. Lucent Technologies. NIST Study: Quantum Computers Will Make Current Cryptography Obsolete It's the digital equivalent of the evolutionary chase between predator venom and prey tolerance. The latter has an emphasis on practical applications. Also, researchers at IBM have. Quantum cryptography is the combination of quantum mechanics and the art of code-making. I received my Ph. Home / News / NIST Moving Forward in Post Quantum Cryptography Standardization.



Research papers in cryptography. But only the unbiased AI will survive. Served as a member of the SIGACT Executive Board and a council member of the Computing Community Consortium. But it would probably require a few advanced math degrees to apply. 645 (Cryptanalysis of Lattice-based Cryptography); the European Commission through the ERC Starting Grant ERC-2013-StG-335086 (LATTAC). Cryptography protects our information as it travels over and is stored on the internet—whether making a purchase from an online store or accessing work email remotely. IBM Lattice Cryptography Is Needed Now To Defend Against Quantum Computing Future. Original research papers pertaining to all aspects of cryptography are solicited. Watson Research Center, summer 2015). Extensive open academic research into cryptography is relatively recent; it began only in the mid-1970s. Watson Research Center. 47-52, January 2004 Gilles Brassard , Louis Salvail, Secret-key reconciliation by public discussion, Workshop on the theory and application of cryptographic techniques on Advances in cryptology, p. IBM Research Report Performance Considerations in Web Security Arun K. 21 hours ago · Jeffrey Welser, vice president and lab director at IBM Research at Almaden, breaks down quantum computing in terms anyone can understand. Record Breaking DES Key Search Completed. It will be held at the University of California, Santa Barbara (UCSB) August 19-23 2018. Cecilia Boschini, a predoctoral researcher at IBM's Zurich Research Laboratory, discussed how the company is using lattice cryptography to create post-quantum encryption. Until they encounter lattice cryptography.



One is the Data Encryption Standard (DES), developed at IBIM and now in wide use for commercial cryptographic applications. Alibaba, Alphabet (Google’s parent), IBM, Microsoft and the like are vying to build commercial versions, who runs the security and cryptography team at Microsoft Research, thinks a. Watson Research Center Yorktown Heights, New York LIMITED DISTRIBUTION NOTICE This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. IBM Corporation. Hopefully, quantum cryptology will be able to stay one step ahead as decoding methods continue to advance. Quantum cryptography is an approach to securing communications or an unhackable way of communicating information. 8 IBM Research 4. Watson - Tokyo - Zurich LIMITED DISTRIBUTION NOTICE: This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. com:ibm-research/vicos. Cryptography program at the Simons Institute for the Theory of Computing, Berkeley, May 2015-August 2015. The IBM Research Division conducts scientific research and develops technologies and processes for use with IBM products and customer applications. – Horst Feistel (IBM) created the ”Lucifer” block cipher as a result of research hobby. Summer of 99 Research intern in the Cryptography Group. When the NSA got wind of the research developments at IBM, Stanford and MIT in the 1970s they scrambled to block publication of their early studies. The advantage of quantum cryptography is that it allows the execution of various cryptographic tasks which are considered to be quite complicated and nearly impossible using only classical communication.



Krishna was speaking at IBM's Think 2019 event held in San Francisco, offering insights into what the real world impact of Quantum computing can potentially have on today's cryptography. Instead of using encryption algorithms that resist attacks using conventional computers, but that can be easily solved by quantum computers,. the Netherlands Organization for Scientific Research (NWO) through Veni grant 639. IBM is recognized as the leading enterprise blockchain provider. I am a postdoctoral researcher in the area of cryptography, working at IBM Research, Zürich. Armonk, NY-based information tech giant IBM (NYSE while cryptography and annealing applications. Bio: Hugo Krawczyk is an IBM Fellow and Distinguished Research Staff Member with the Cryptography Group at the IBM T. The IBM Research Division conducts scientific research and develops technologies and processes for use with IBM products and customer applications. Until they encounter lattice cryptography. International Business Machines Corp. The quantum cryptography market comprises several stakeholders, such as encryption solution providers, quantum cryptography vendors, application security service providers, system integrators/network security service providers, consultancy/advisory firms, quantum computing and quantum cryptography Research and Development (R&D) firms. Our research and engineering work focuses on how private information and communications will be protected when more powerful computers, such as quantum computers, which can. IBM Fellow Awarded Levchin Prize for Contributions to Cryptography. Scientist and Innovator, proud leader of IBM Research in Europe and proud father. With lattice cryptography we can work on a file, or encrypt it, without ever exposing sensitive data to hackers. The EU is now also intensifying its research on post-quantum cryptography: The EU Commission is investing EUR 3. Internet connected devices will leap from 500 Million to 1 Trillion. This Research Report is available. The new Department of Marine Sciences is a multi-disciplinary academic environment including biology, chemistry, oceanography, geology and conservation. I am also interested in number theory, game theory, and both classical and quantum information theory.



In the late 1960’s, however, IBM chairman Thomas Watson Jr, set up a cryptography research group at the company’s Yorktown Heights research laboratory in New York. Today, quantum computing is a researcher. Wei-Yen Day (Ph. Find IBM Cryptography jobs on Glassdoor. The IBM Journal of Research and Development is a peer-reviewed technical journal, published bimonthly, which features the work of authors in the science, technology and engineering of information systems. TXT for Doom says a 386 processor and 4MB of RAM is the minimum). Cryptography Research - overview. But it would probably require a few advanced math degrees to apply. Cryptography protects our information as it travels over and is stored on the internet—whether making a purchase from an online store or accessing work email remotely. Isogeny cryptography originally came out of Microsoft in the early 2000s and Craig Gentry (the person who invented the first working example of fully homomorphic encryption) now works at IBM. when an Egyptian scribe used non-standard hieroglyphs in an inscription. 2019 — Physicists are proposing a new model that could demonstrate the supremacy of quantum computers over. The department activities cover all aspects of Cloud IaaS, including Compute, Storage, Datacenter Networking, Security and Data Services for Analytics. The IBM Thomas J. Following that I was an Assistant Professor at the Department of Computer Science at Yale University between 2016 and 2018. 100 qubit quantum computer in June, 2018 a 200 qubit system in Feb, 2019 and 400 qubits in October 2019.



Speaking at an interview, IBM executives have highlighted the threat quantum computing pose to cryptocurrencies and blockchain cryptography. Cryptography gets a boost with nanotechnology. So-called lattice cryptography will be used to fight cyberattackers. Post-Quantum Cryptography: A Ten-Year Market and Technology Forecast, 2018-2028 - ResearchAndMarkets. by MSRVideo. The topics focus on applied computer science issues, in general, and on issues related to work carried out at IBM Research. Each year, they showcase some of the biggest breakthroughs coming out of IBM Research's global labs - five technologies that they believe will fundamentally reshape. Bennett's recent work at IBM has concentrated on a re-examination of the physical basis of information, applying quantum physics to the problems surrounding information exchange. Quantum cryptography is considered as the methodology of using quantum mechanical properties in order to perform complicated cryptographic tasks. The company's research, technical and business experts have broken barriers in transaction processing speeds, developed the most advanced cryptography to secure transactions, and are contributing. Jan was leading the FP7 European research consortia PRIME and PrimeLife on privacy and identity management and currently leads the Chistera project USEIT. 5 in 5 Video: Hackers gonna hack. This could happen in a little more than. The following IBM journal articles are freely available for all users to view: Algorithmic Information Theory Cryptography. Quantum Computer Research. Hub members have remote IBM Cloud access to its 20-qubit processor system housed at the IBM Thomas J. Summer of 99 Research intern in the Cryptography Group. For more information see the Cryptology ePrint Archive; International Association for Cryptologic Research (IACR); Craig Gentry's Home Page (Cryptography Research Group, IBM T. Internet connected devices will leap from 500 Million to 1 Trillion. Prior to coming to Bar-Ilan in 2004, I was a Raviv Postdoctoral fellow in the Cryptographic Research Group at the IBM T.



The public key extension. IBM has long recognized the importance of information privacy and led by example in its own privacy polices and practices: the company was the first multinational to adopt a global privacy policy in the late 1960s, and continued that leadership as recently as 2005 when it was the first company to address genetic privacy. Horst Feistel led a research project at the IBM Watson Research Lab in the 1960's which developed the Lucifer cipher. Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded. Research Intern IBM April 2018 – Present 1 year 3 months. During the IBM Research 5 in 5 Science Slam at IBM Think 2018, IBM researcher Cecilia Boschini explains one of the technologies that will change the world in the next five years: lattice cryptography. Hohenberger was a post-doc at IBM Research in Zurich, Switzerland. Hub members have remote IBM Cloud access to its 20-qubit processor system housed at the IBM Thomas J. Advanced Wireless Technologies developed the chip specification, board layout, and system assembly. The computers used in such cryptography could drive up the price of a smart grid. “It captured the imagination of many researchers who took notice of. Watson Research center. Cryptography program at the Simons Institute for the Theory of Computing, Berkeley, May 2015-August 2015. Former researcher at Cryptography Research Group at IBM, creator of the first FHE scheme, recipient of the MacArthur "Genius" Award. May 2017, co-advised with Prof. Get to know Cryptography Research, Inc. Watson Research Center. The IBM Research - Zurich Lab has two groups working in the broad area of information security and cryptography.



Yearning for the sun, along with my wife Carol, I left IBM Research in 1982 and accepted a position as a professor in the Computer Science Department at the University of California (Santa Barbara). Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption. But with lattice cryptography, we'll be prepared. The IBM Research Division conducts scientific research and develops technologies and processes for use with IBM products and customer applications. Jan 17, 2019 · IBM Lattice Cryptography Is Needed Now To Defend Against Quantum Computing Future. We have seen exciting developments in cryptography: public-key encryption, digital signatures, the Data Encryption Standard (DES), key safeguarding schemes, and key distribution protocols. He has contributed to the cryptographic design of numerous Internet standards, particularly IPsec, IKE, and SSL/TLS, and is a co. At IBM Research - Zurich more than 30 researchers in the area of information security are focusing on cryptography, secure systems, and security management. Research papers in cryptography. Quantum cryptography is an approach to securing communications or an unhackable way of communicating information. Julius Caesar uses cryptographic technique 1861 Union forces use a cipher during Civil War 1919 Germans develop the Enigma machine for encryption 1976 IBM develops DES 1976 Diffie Hellman develop public key private key cryptography 1977 Rivest Shamir Adleman develop the RSA algorithm for public key / private key. This later inspired the US DES (below) and other product ciphers, creating a family labeled ``Feistel ciphers''. The MIT-IBM Watson AI Lab is a joint-research effort to drive AI-related breakthroughs beyond the current bounds of deep learning and basic algorithm development. The proceedings of ACNS 2018 will be. Dario Gil, Vice President of Science and Solutions at IBM Research, presents his talk on the Future of Computing in which he shares the news for the first time that IBM’s scientists have successfully built and measured a processor prototype with 50 quantum bits, known as qubits — a major milestone in quantum computing. Browse Cryptography news, research and analysis from The Conversation Part of IBM Research's quantum computer. Read the latest news in developing quantum computers. Original research papers on all technical aspects of cryptology are solicited for submission to ACNS '05, the Third annual conference on Applied Cryptography and Network Security. But it would probably require a few advanced math degrees to apply.



In my 24 years at UCSB, I taught courses in Assembly Language, Performance Evaluation, Computer Networks and Cryptography. Such circuitous, expensive and often risky financial transactions are what my team at IBM Research, and our partners at the Linux Foundation want to flip on its head with blockchain. IBM Fellow Hugo Krawczyk is awarded the Levchin Prize for Contributions to Cryptography and is recognized for developing fundamental and lasting contributions to the theoretical and practical foundations of cryptography. Learn the business implifications, and applications of quantum, and take the next step in your career. Introduction. IBM Research D. Among IBM's annual 5 in 5 list is the world's smallest computer, smaller than a grain of salt – seen here as the tiny white dot on the lefthand corner of the chip (Credit: IBM Research). Find IBM Cryptography jobs on Glassdoor. SSL/TLS does encryption and server -side authentication Client-side authentication by username- password Mostly self -claimed attributes (except perhaps email, credit card). Original research papers pertaining to all aspects of cryptography are solicited. She previously led technical strategy at IBM Watson Health Innovation, with a focus on data and AI. 1960s: Until the 1960s, the right to create and break codes was believed to belong solely to US government. Computational Fabrication Group. One is the Data Encryption Standard (DES), developed at IBIM and now in wide use for commercial cryptographic applications. Theory Seminar at Microsoft Research Silicon Valley , December 2010. Alibaba, Alphabet (Google’s parent), IBM, Microsoft and the like are vying to build commercial versions, who runs the security and cryptography team at Microsoft Research, thinks a. "Trying to build security that will last 20 to 30 years for a defense program is very, very challenging," says Benjamin Jun, vice president and chief technology officer at Cryptography Research.



IBM Research, that is betting big on AI, blockchain, lattice cryptography and quantum computing, has come up with its annual “5 in 5” technology predictions which the tech giant believes will. The Industry Platforms and Blockchain group at IBM Research - Zurich offers an exciting research environment with the opportunity to collaborate with researchers working on various aspects of security and cryptography, including blockchain, lattice-based cryptography, provably secure protocol design and system security. Watson Research Center whose interests span theoretical and applied aspects of cryptography. One is the Data Encryption Standard (DES), developed at IBIM and now in wide use for commercial cryptographic applications. by MSRVideo. IBM Research announced a 50 qubit quantum computer system in November, 2017. She has worked on a number of Biometrics projects including EEG biometrics for authentication and invariant age progression of faces. Correction in the research in this paper award at bell id card. Watson Research Center. Jessica Lyons Hardcastle May 14, 2018 Co-founder and CEO Ambuj Kumar previously worked at Cryptography Research. The architecture could hide the most sensitive data within complex algebraic structure, so that it could not be accessed from the outside without solving an extensive amount of math problems. He was the founder of Microsoft. Prior to his Ph. Jul 14, 2019 · Jeffrey Welser, vice president and lab director at IBM Research at Almaden, breaks down quantum computing in terms anyone can understand. 5 in 5 Video: Hackers gonna hack. Box 218 Yorktown Heights, NY 10598 Research Division Almaden - Austin - Beijing - Haifa - T. they would not be vulnerable. Over short distances on the ground, quantum cryptography will be much simpler and cheaper. IBM Research has produced leading contributions to the technology underlying IBM's product portfolio, as well as to the world of science and the entire IT industry.



IBM Research Report Performance Considerations in Web Security Arun K. Cryptography research has con-centrated on mathematically formalizing (a small number of) security assumptions, such as “computing. ECRYPT-CSA and PQCRYPTO organize a conference on post-quantum cryptography on 31 Jan and 01 Feb. Coppersmith's work in the area of block cipher cryptology contributed to the Data Encryption standard (DES), which has served as the cryptographic standard for the past twenty-five years and enables secure communications and commerce. Rochester was concerned with the development of radar for seven years and computing machinery for seven years. Such circuitous, expensive and often risky financial transactions are what my team at IBM Research, and our partners at the Linux Foundation want to flip on its head with blockchain. Her research focuses on the general area of cryptography and, more specifically, on secure multiparty computation, threshold cryptography and proactive security which the National Research Council Cybersecurity Report. Professionals, researchers and practitioners in the area of computer security and applied cryptography with an interest in practical applications of homomorphic encryption, encrypted computing, functional encryption and secure function evaluation, private information retrieval and searchable encryption. Bringing together a fascinating mixtureoftopicsinengineering,mathematics,computerscience,andinformatics,this. Cryptography research has con-centrated on mathematically formalizing (a small number of) security assumptions, such as "computing. It has been. share: Bill Gates never worked for IBM. In response, cryptographic standards and implementations are being scrutinized to evaluate whether they resist a powerful threat model, that includes subversion of the supply chain and sophisticated malware. IBM Research Australia is looking for a Postdoctoral Researcher in Blockchain Platform. The process certainly isn't perfect. IBM Research has produced leading contributions to the technology underlying IBM's product portfolio, as well as to the world of science and the entire IT industry. The breakthrough may pave the way to secure cloud computing services. Research Interests My research interests lie in the broad areas of Security, Networking, and Big Data Analytics with a focus on experiments and modeling in the following domains. Current group members are: Fabrice Benhamouda, Charanjit Jutla. Read 72 publications, and contact Daniel Wichs on ResearchGate, the professional network for.



His research interests include many topics in security, privacy and applied cryptography. Consult your local IBM business contact for information on the IBM offerings available in your area. The Stony Brook Algorithm Repository. Watson research lab as a Postdoctoral fellow in the cryptography research group. This team is working on the challenging factors in the areas of Blockchain interoperability , scalability, value networks and governance, and also while working with enterprise clients to realize the value of blockchain systems today. IBM Corporation. A research student who had a summer job at IBM, has cracked a cryptography problem that has baffled experts for over 30 years. IBM Research Report Building a High-Performance, Programmable Secure Coprocessor Sean Smith, Steve Weingart IBM Research Division T. Algorithm Development. I am currently working on efficient zero-knowledge proofs, especially those based on lattice assumptions. Recent research shows that when the NSA’s default parameters are replaced with new values, the current popular cryptography libraries are still vulnerable. Watson Research Center, summer 2015). 9807-12&26. DIMACS invites applications for research visits in association with the Special Focus on Cryptography and the related DIMACS/Simons Collaboration in Cryptography. Cryptography was used as a tool to protect national secrets and strategies. Watson Research Center is the headquarters for IBM Research -- the largest industrial research organization in the world, with eight labs in six countries. Jan 17, 2019 · IBM Lattice Cryptography Is Needed Now To Defend Against Quantum Computing Future.



Growing up in Argentina, and studying in Israel, not far from where his career started at IBM’s Haifa Lab, IBM Fellow and cryptographer, Hugo M. The breakthrough may pave the way to secure cloud computing services. (Smart contracts are computer programs that can automatically execute the terms of a contract. Studies Quantum Cryptography. Charles Bennett, IBM Research, Physical Sciences Department, Department Member. Growing use of cyber security solutions in public utilities, escalating need for cyber security in the defense sector, incoming demand from business enterprises, and the need for secure internet transaction are some of the other factors augmenting the demand in the global quantum cryptography market. Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security. 4 However, there are reports that D-Wave's quantum speedup analysis is debatable. Advanced Wireless Technologies developed the chip specification, board layout, and system assembly. IET and e-voting for digital watermarking; Student awards from Detica, Fyvium, IBM, Microsoft, Renew, Honda, Thales Research & Technology and Thoughtified. The retreats are open to the public. Computational number theory and algebra, analysis of randomized and quantum algorithms, cryptography. IBM also contributed cryptography and smart contract code. The topics focus on applied computer science issues, in general, and on issues related to work carried out at IBM Research. The conference is organized by the International Association for Cryptologic Research (IACR). IBM Center for Blockchain Innovation (ICBI) is a part of IBM Research Center in Singapore.



The 16th International Conference on Applied Cryptography and Network Security (ACNS2018) will be held in Leuven, Belgium from 2-4 July 2018. Supervisor: Tal Rabin. In 2009, his dissertation, in which he constructed the first Fully Homomorphic Encryption scheme, won the ACM Doctoral Dissertation Award. The mathematical theory and practice of both cryptography and coding underpins the provision of effective security and reliability for data communication, processing and storage. Laws of Physics Say Quantum Cryptography Is Unhackable. Although such systems will be expensive, "For secure diplomatic and military communications, they could ultimately be the method of choice," says Donald Bethune, a quantum researcher at IBM's Almaden Research Center in San Jose, California. Cecilia Boschini, a predoctoral researcher at IBM's Zurich Research Laboratory, discussed how the company is using lattice cryptography to create post-quantum encryption. Microsoft Adds Post-Quantum Cryptography to an OpenVPN Fork. This report documents the results of the M. IBM has long recognized the importance of information privacy and led by example in its own privacy polices and practices: the company was the first multinational to adopt a global privacy policy in the late 1960s, and continued that leadership as recently as 2005 when it was the first company to address genetic privacy. they would not be vulnerable. Standard organizations around the globe are advising stakeholders to plan for the future. Conventional computers can do this, but it's very difficult. But it would probably require a few advanced math degrees to apply. This is a draft proposal to renew the collaboration between NTT and MIT in the areas of cryptography and information security. Introduction to Cryptography Feistel ciphers, while working at IBM’s Watson Research Laboratory. Home » News » IBM Research-Zurich Team Cracks the Molecular Code with Right Kind of Quantum Hardware (IBMblog) A recent research blog written by Marc Ganzhorn, Daniel Egger, and Stefan Filipp explains how their team at IBM Research-Zurich now lays out how exchange-type two-qubit gates constitute a very promising avenue to calculate molecular properties. IBM June 2016 – October 2016 5 months. Watson Research Center P. About IBM (IBM): IBM (IBM) is recognized as the leading enterprise blockchain provider. Ibm Research Cryptography.